This commit is contained in:
2025-07-21 21:44:08 +03:00
parent df868c922b
commit 031f3329a4
11 changed files with 673 additions and 0 deletions

114
posts/whoami.html Normal file
View File

@@ -0,0 +1,114 @@
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>elleoma ~ > cat whoami</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<link href="https://fonts.googleapis.com/css2?family=Fira+Code&display=swap" rel="stylesheet">
<link rel="stylesheet" href="../styles.css">
</head>
<body>
<div class="scroll-container">
<div class="center-window">
<header>
<h1>elleoma@0day ~ > ls</h1>
<nav>
<a href="../index.html">./home</a>
<a href="../projects.html">./projects</a>
<a href="../about.html">./about</a>
<a href="../blog.html">./blog</a>
<a href="../contact.html">./contact</a>
</nav>
</header>
<main>
<section class="markdown-container">
<h1>~ &gt; whoami</h1>
<p>Im a Ukrainian student and a unix/linux & open-source enthusiast, trying to get into cybersecurity, gain some practical skills.</p>
<h2>My interests are:</h2>
<ul>
<li>Cybersecurity</li>
<li>Low-level programming: C, Rust, Zig, C++, Assembly</li>
<li>Reverse engineering (IDA, Ghidra, NinjaBinary)</li>
<li>Electrical engineering</li>
<li>PCB designing (KiCad — yet to try)</li>
<li>Self-hosting</li>
<li>A little bit of 3D</li>
<li>A little bit of game development</li>
</ul>
<hr />
<h2>Self-hosting</h2>
<p>I have a Raspberry Pi 5 with 4GB of RAM running DietPi and nixpkgs (I hate outdated Debian packages).</p>
<p>Currently hosting a bunch of stuff on it via Docker containers with help of desec.io.</p>
<img src="../self-host.png" alt="My self-hosting setup" width="500">
<hr />
<h2>Some project I have</h2>
<h3><a class="post-title" href="https://git.forsen-cock.dedyn.io/elleoma/facinus">Facinus</a></h3>
<p>Since our college switched from Windows to Ubuntu, I had a cool idea to remotely control my classroom PCs.</p>
<p>I discovered <code>gsocket.io</code> and started developing a tool that deploys a local web admin panel to collect logs from connected clients.</p>
<p>I used an Ubuntu VM in QEMU and Bash scripted everything with some help of AI.</p>
<hr />
<h2>Cybersecurity</h2>
<p>Ive been into cybersecurity for about 2 years now. I started with the normie setup — Kali Linux dual-booted next to Windows, learning through trial and error.</p>
<p>Eventually I spent more time on Linux, moved to KDE, configured everything myself, riced my terminal. Later switched to Arch and Hyprland.</p>
<p>I still have lots to learn, and Id love to document all the tools and techniques I come across.</p>
<h3>HackTheBox</h3>
<p>HTB gave me that initial hands-on boost I needed.As of right now Ive solved more than 50 boxes (3 of them “Insane”: DarkCorp, Mist, and MassGarden).</p>
<p>Even though I sometimes rely on writeups and walkthroughs, I learn a lot from the infrastructure behind each box.</p>
<p>Im not sure if using writeups spoils the learning, but for now it gives me clarity and saves time. I aim to shift toward solving without spoilers in the future.</p>
<h3>Russian targets</h3>
<p>Im Ukrainian, so I practice skills on real russian infrastructure. Its morally right and beneficial, especially in these times.</p>
<hr />
<h2>Bug bounty</h2>
<p>Bug bounty is fascinating — legally hacking in-scope apps and possibly earning money.</p>
<p>But as a beginner, its tough. Recon is time-consuming, and rewards dont always justify the effort unless you're really skilled.</p>
<p>Ive tried a few programs but haven't found any serious vulnerabilities yet. I plan to shift my focus toward learning specific attack techniques and improving my skills first.</p>
<hr />
<h2>My setup</h2>
<p>I use Arch Linux on a laptop — it just works and lets me get things done. I run Hyprland and use NVChad for Neovim.</p>
<p>Heres my <code>fastfetch</code> output:</p>
<pre><code>~/shit fastfetch
OS : Arch Linux x86_64
Kernel : Linux 6.15.5-arch1-1
Packages : 2025 (pacman), 10 (flatpak-system), 1 (flatpak-user)
Display : 1920x1080 @ 144 Hz in 15" [Built-in]
WM : Hyprland 0.49.0 (Wayland)
Terminal : tmux 3.5a
CPU : 12th Gen Intel(R) Core(TM) i7-12650H
GPU : GeForce RTX 4060 Max-Q / Mobile
GPU : UHD Graphics
GPU Driver : nvidia (proprietary) 575.64.03
GPU Driver : i915
Memory : 9.28 GiB / 15.32 GiB (61%)
OS Age : 182 days
Uptime : 9 hours, 40 mins
</code></pre>
<p>My dotfiles are here: <a class="post-title" href="https://git.forsen-cock.dedyn.io/elleoma/dotfiles">dotfiles</a></p>
</section>
</main>
<footer>
<p><code>hosted on raspberry pi 5</code></p>
</footer>
</div>
</div>
</body>
</html>

88
posts/whoami.md Normal file
View File

@@ -0,0 +1,88 @@
# ~ > whoami
I'm a Ukrainian student and a unix/linux & open-source enthusiast, trying to get into cybersecurity, gain some practical skills
# My interests are:
- cybersecurity
- low-level programming: C, Rust, Zig, C++, Assembly (I know slightly about each one, but not to the level of creating big projects)
- reverse engineering (IDA, Ghidra, NinjaBinary)
- electrical engineering
- PCB designing, KiCad (yet to try this stuff)
- self-hosting
- a little bit of 3d
- a little bit of game developing
---
# Self-hosting
I have a Raspberry Pi 5 with 4GB of RAM and RaspberryPi OS (i hate outdated debian packages)
And I'm hosting a bunch of stuff on it right now
<img src="../self-host.png" alt="My self-hosting setup" width=500 />
Basically some docker containers with help of desec.io, I host my domain there for free
---
# Some project I have
## [Facinus](https://git.forsen-cock.dedyn.io/elleoma/facinus)
Since our college decided to switch from windows to ubuntu, I got a cool idea to have remote control over my college PCns in computer class
I knew that there is this cool open-source project called gsocket.io that lets you quickly deploy their soft on any device that runs linux
So I started my development by setting up an ubuntu VM in Qemu and with the help of AI I started bash scripting my tool that deploys a local web server with admin panel that receives logs from 'hacked' PCs.
---
# Cybersecurity
My main interest that I have for around 2 years.
I had a classic, normie approach at first - installed Kali on my laptop as a double OS setup, next to the windows
It wasn't for the first time, I did it in a VM but couldn't get wifi working properly, I didn't know I had to have a wifi dongle because hosts wifi module wouldn't passthrough to VM
Since then I slowly started spending more time using linux than windows, loved configuring things, moved to KDE Plasma, riced my terminal - basic stuff
I have a lot of things to learn yet, I would like to write all different kinds of things I'm familiar with, though I'm not sure how yet since there so many stuff!
## HackTheBox
I knew about TryHackMe and maybe some other resources (like reddit lol) where I can try to get into cybersec/hacking stuff, found out about HackTheBox and really liked their approach to the new people in the industry
I enjoyed 'getting started' guides with pdfs it gave me that practical knowledge I needed and since then I got addicted to CTFs
Right now I have 48 root/user owns and 3 of them are insane boxes - DarkCorp, Mist (did it with the ippsec guide but got insane amount of knowledge) and MassGarden
To be honest, I did almost all of them with the help of leaked or official writeups, so I'm not that skilled, I just wanted to understand the box infrastructure without spending a lot of time in random rabbit holes because of the lack of my practical knowledge skills
I don't know if I have been doing a big mistake with that, I don't really know the best way to approach such things. Probably researching different things and trying to find new approaches would get me waaayy more knowledge rather than spoiling the whole process to myself
## russian targets
I'm Ukrainian so I can also sharpen my skills on real targets in russia. I think it is morally right and legal (at least for me), fun and also helpful :)
# Bug-bounty
My opinion on bug-bounty is pretty simple - I really like the concept: you hack the in-scope targets and if you find something vulnerable - you report it and eventually get some money ;)
The other side of the coin is that the money you would get is not rewarding for the time, effort you have spent and often the impact of the vulnerability itself. It is ESPECIALLY hard if you are a beginner, like me
I tried several programs, spent a day or two researching, doing reconnaissance and simple attacks but never have I found any vulnerability. I should probably spend more time to get something interesting out of these programs but it gets always so messy to analyze every aspect of the target after some time, that I lose any motivation for it. Understanding that my skills are not high enough lead me to think I should focus more on learning new vectors of attacks and apply them on corresponding targets.
Also it's not always easy to find a good program that doesn't have an insanely big infrastructure that you need to analyze. It becomes difficult to find something interesting in a pile of mess
# My setup
It's pretty simple - a laptop with Arch Linux, I use it becaus it just works and gets the job done :)
To be more specific, here is my fastfetch output:
```
~/shit/notes  main  !? fastfetch
OS : Arch Linux x86_64
Kernel : Linux 6.15.5-arch1-1
Packages : 2025 (pacman), 10 (flatpak-system), 1 (flatpak-user)
Display : 1920x1080 @ 144 Hz in 15" [Built-in]
WM : Hyprland 0.49.0 (Wayland)
Terminal : tmux 3.5a
CPU : 12th Gen Intel(R) Core(TM) i7-12650H
GPU : GeForce RTX 4060 Max-Q / Mobile
GPU : UHD Graphics
GPU Driver : nvidia (proprietary) 575.64.03
GPU Driver : i915
Memory : 9.28 GiB / 15.32 GiB (61%)
OS Age : 182 days
Uptime : 9 hours, 40 mins
```
I use Hyprland as a DE and a separate preconfigured project - HyDE. And neovim with NVChad as a text editor
You can check my dotfiles here: [dotfiles](https://git.forsen-cock.dedyn.io/elleoma/dotfiles)